Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity - Helion

Tytuł oryginału: Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
ISBN: 9781801076975
stron: 390, Format: ebook
Data wydania: 2024-06-28
Księgarnia: Helion
Cena książki: 149,00 zł
Malware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you’ll focus on the ethical considerations that ethical hackers must uphold. You’ll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software.
By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.
Osoby które kupowały "Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity", wybierały także:
- PLC i TIA Portal. Kurs video. Techniki programowania SIMATIC S7-1200 200,00 zł, (10,00 zł -95%)
- Google Cloud. Kurs video. Zostań administratorem systemów IT 142,86 zł, (10,00 zł -93%)
- Instalacja i konfiguracja baz danych. Kurs video. Przygotowanie do egzaminu 70-765 Provisioning SQL Databases 285,57 zł, (19,99 zł -93%)
- Jak zhakowa 125,00 zł, (10,00 zł -92%)
- Excel w HR. Kurs video. Od teorii do praktyki 222,11 zł, (19,99 zł -91%)
Spis treści
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity eBook -- spis treści
- 1. A Quick Introduction to Malware Development
- 2. Exploring Various Malware Injection Attacks
- 3. Mastering Malware Persistence Mechanisms
- 4. Mastering Privilege Escalation on Compromised Systems
- 5. Anti-Debugging Tricks
- 6. Navigating Anti-Virtual Machine Strategies
- 7. Strategies for Anti-Disassembly
- 8. Navigating the Antivirus Labyrinth – a Game of Cat and Mouse
- 9. Exploring Hash Algorithms
- 10. Simple Ciphers
- 11. Unveiling Common Cryptography in Malware
- 12. Advanced Math Algorithms and Custom Encoding
- 13. Classic Malware Examples
- 14. APT and Cybercrime
- 15. Malware Source Code Leaks
- 16. Ransomware and Modern Threats